Yee Wei Law

According to our database1, Yee Wei Law authored at least 58 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Domain Adaptation for Satellite-Borne Hyperspectral Cloud Detection.
CoRR, 2023

Diagnosing Rolling-Element Bearing Faults in the Real World: Problem Solved?
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

2022
Optimal Maneuvering for Autonomous Vehicle Self-Localization.
Entropy, 2022

Physical Adversarial Attacks on an Aerial Imagery Object Detector.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

2021
Optimal Beacon Placement for Self-Localization Using Three Beacon Bearings.
Symmetry, 2021

Adversarial Attacks against a Satellite-borne Multispectral Cloud Detector.
CoRR, 2021

A Multi-viewpoint Outdoor Dataset for Human Action Recognition.
CoRR, 2021

2020
A Multiviewpoint Outdoor Dataset for Human Action Recognition.
IEEE Trans. Hum. Mach. Syst., 2020

Exploiting similar prior knowledge for compressing ECG signals.
Biomed. Signal Process. Control., 2020

Towards Distributed Privacy-Preserving Prediction.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

Drss-Based Localisation Using Weighted Instrumental Variables and Selective Power Measurement.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

2019
Distributed Privacy-Preserving Prediction.
CoRR, 2019

Reducing the Bias in DRSS-Based Localization: An Instrumental Variable Approach.
Proceedings of the 27th European Signal Processing Conference, 2019

2018
Privacy-preserving collaborative fuzzy clustering.
Data Knowl. Eng., 2018

Human Pose and Path Estimation from Aerial Video Using Dynamic Classifier Selection.
Cogn. Comput., 2018

UAV-GESTURE: A Dataset for UAV Control and Gesture Recognition.
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

The Sixth Visual Object Tracking VOT2018 Challenge Results.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Proceedings of the Computer Vision - ECCV 2018 Workshops, 2018

2017
An Analytical Model for Coding-Based Reprogramming Protocols in Lossy Wireless Sensor Networks.
IEEE Trans. Computers, 2017

Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Preserving Collaborative Deep Learning with Application to Human Activity Recognition.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
An improved scheme for privacy-preserving collaborative anomaly detection.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, 2016

2014
Participatory Sensing, Privacy, and Trust Management for Interactive Local Government.
IEEE Technol. Soc. Mag., 2014

Privacy-Preserving Collaborative Anomaly Detection for Participatory Sensing.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

2013
A cellular-centric service architecture for machine-to-machine (M2M) communications.
IEEE Wirel. Commun., 2013

WAKE: Key management scheme for wide-area measurement systems in smart grid.
IEEE Commun. Mag., 2013

Analytical model of coding-based reprogramming protocols in lossy wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2013

A pilot study of urban noise monitoring architecture using wireless sensor networks.
Proceedings of the International Conference on Advances in Computing, 2013

Comparative study of multicast authentication schemes with application to wide-area measurement system.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Risk-Aware Distributed Beacon Scheduling for Tree-Based ZigBee Wireless Networks.
IEEE Trans. Mob. Comput., 2012

Demand Response Architectures and Load Management Algorithms for Energy-Efficient Power Grids: A Survey.
Proceedings of the Seventh International Conference on Knowledge, 2012

Enhancing responsiveness and scalability for OpenFlow networks via control-message quenching.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012

Security Games and Risk Minimization for Automatic Generation Control in Smart Grid.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Security games for voltage control in smart grid.
Proceedings of the 50th Annual Allerton Conference on Communication, 2012

2011
KALwEN: a new practical and interoperable key management scheme for body sensor networks.
Secur. Commun. Networks, 2011

Security and dependability for Ambient Intelligence: Informative but busy.
J. Ambient Intell. Smart Environ., 2011

Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2011

KLEIN: A New Family of Lightweight Block Ciphers.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

2010
A Unified Flow Control Approach for QoS Balance in Differentiated Services.
Proceedings of IEEE International Conference on Communications, 2010

KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Secure Data Aggregation in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Key Management in Wireless Sensor Networks.
Proceedings of the Guide to Wireless Sensor Networks, 2009

Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
ACM Trans. Sens. Networks, 2009

Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks.
Int. J. Commun. Netw. Syst. Sci., 2009

Dynamic tunnel routing for reliable and resilient data forwarding in wireless sensor networks.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Energy-efficient data acquisition by adaptive sampling for wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks.
Proceedings of the 4th Annual International Conference on Wireless Internet, 2008

2007
Secure k-Connectivity Properties of Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

2006
Survey and benchmark of block ciphers for wireless sensor networks.
ACM Trans. Sens. Networks, 2006

LicenseScript: a logical language for digital rights management.
Ann. des Télécommunications, 2006

2005
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Link-layer jamming attacks on S-MAC.
Proceedings of the Wireless Sensor Networks, Second European Workshop, 2005

2004
Benchmarking block ciphers for wireless sensor networks.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

2003
LicenseScript: a novel digital rights language and its semantics.
Proceedings of the 3rd International Conference on WEB Delivering of Music (WEDELMUSIC 2003), 2003

Assessing Security in Energy-Efficient Sensor Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

LKHW: A Directed Diffusion-Based Secure Multicast Scheme for Wireless Sensor Networks.
Proceedings of the 32nd International Conference on Parallel Processing Workshops (ICPP 2003 Workshops), 2003

Approximating Fair Use in LicenseScript.
Proceedings of the Digital Libraries: Technology and Management of Indigenous Knowledge for Global Access, 2003


  Loading...